References
- L.Rizzo, "Effective Erasure Codes for Reliable Computer Communication Protocols,"ACM Comp. Comm, Review, vol.27 no2, pp.24-36, April 1997. https://doi.org/10.1145/263876.263881
- P.Ferre, D.Agrafiots, T.K. Chiew, A.R.Nix, and D.R. Bull,"Multimedia Transmission over IEEE 802.1 1g WLANS: Practical Issues and Consideration," ICCE 2007, pp.1-2, Las Vegas. Jan. 2007.
- Robert L Grossman, Harinath Sivakumar and S. Bailey,PSockets: The case for application-level network striping for data intensive applications using high speed wide area networks, Supercomputing, IEEE and ACM, 2000.
- T. Durnigan, Parallel TCP, August 2002.http://www.csm.ornl.gov/-dunigan/netperf/parallel.html
- International Organization for Standardization, "ISO/IEC 18000-3, Information Technology AIDC Technique -RFID for Item Management," March 2003.
- Stephen A. Weis, Sanjay E.Sarma, Ronald L. Rivest and Daiel W. Engels, "Security and Privacy Aspects of Low-Cost Radio Frequency Identification Systems", First International Conference on Security in Pervasive Computing, 2003.
- Martin Feldhofer, "A proposal for Authentication Protocol in Secutity Layer for RFID Smart Tags," IEEE Proceedings of MELECON 2004, Vol. 2, pp. 759-762, 2004.
- Santosh Mahapatra and Xin Yuan,"Load Balancing Mechanism in data Center Networks," IEEE CEWIT 2010.
- Mohammad Al-Fares Alexander Loukissas, Amin Vahdat."A Scalable, Commodity Data Center Network Architecture," proceedings of SIGCOMM 2008.
- Joan Daemen, Vincent Rijmen, "AES Proposal: Rijndael ", (http://csrc.nist.gov/encryption/aes/rijndael/Rijindael.pdf)
- M.jakobsson and D. Pointcheval, "Mutual Authentication for Low-power Mobile Devices," Lecture Notes in Computer Science, pp. 178-196, 2002.
- J.Zhou, Z.Cao, X.L.Dong, X.D.Lin, "Securingmhealthcare social networks:challenges, Communications, Vol.20, No.4, pp.12-21, 2013.
- U.Harish, R. Ganesan, "Design and development of secured m-healthcare system", International conference on Advances in Engineering, Science and Management(ICAESM), pp.470-473, 2012.
- www.ushmmorg/research/doctors/Nuremberg_Code.htm
- Curphey, Araujo. Web Application Security Assessment Tools, IEEE Security and Privacy archive, Volume 4 Issue 4, pp.32-41, 2006. https://doi.org/10.1109/MSP.2006.108
- B.Chess, G. McGraw. Static Analysis for Security, IEEE Security & Privacy, pp.79-84, 2004.
- Mariantonietta La Pilla, Fabio Martinelli, and Daniele Sgandurra. A Survey on Security for Mible Device, IEEE communication Surveys and Tutorials, Vol. PP,Issue 99, pp.1-26, 2012